1.4 Network attacks Flashcards
What is a rogue access point?
a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker
How to prevent a rogue access point?
- period review of the building access point
- use a NAC that require to everybody to authenticate over the network before access it
What is a wireless evil twins?
evil twin is a copy of a legitimate access point
What is rogue access point vs evil twin?
A rogue access point is an illegitimate access point plugged into a network to create a bypass from outside into the legitimate network. By contrast, an evil twin is a copy of a legitimate access point.
How to protect from evil twins?
make sure a vpn is install and the data are encrypted over the network
What is bluesnarfing?
form of hacking that lets attackers access a device through its discoverable Bluetooth connection. Once a device or phone is bluebugged, a hacker can listen to the calls, read and send messages and steal and modify contacts
What is bluejacking?
Bluejacking is used for sending unauthorized messages to another Bluetooth device. This is not a big security concern
What is a wireless disassociation attack?
The attack involves sending forged deauthentication packets to a wireless access point (AP), causing the target device to disconnect from the network.
The attacker sends a large number of deauthentication packets with a spoofed source address to the AP or client device, making it appear as if the packets are coming from the network’s legitimate source. This causes the target device to disconnect from the network and may prevent it from reconnecting for a period of time.
It is used to steal data, do MITM and as a form of DoS,
What is a wireless jamming attack?
The jamming attack is one of the serious threats to wireless sensor networks ( WSNs ) using the IEEE 802.15. 4 standard. In such an attack, jammers, who launch the attack, can dramatically degrade the network performance by interfering transmitting packets.
What is RFID?
Radio Frequency Identification. Technology use in badge access, line tracking and anything that need to be tracked
How RFID technology work ?
An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This
What are RFID attacks?
- data capture (view communication) done via MITM
- spoof the reader
- Denial of service
What is NFC?
NFC, or near-field communication, is a short-range wireless technology that allows your phone to act as a transit pass or credit card, quickly transfer data.
What are NFC attacks?
- remote capture of data
- frequency jamming lead to denial of service
- relay/ replay attack
What is the difference between NFC and RFID?
NFC is a subset of RFID technology that was initially designed to support short-range communication for mobile devices. Through magnetic field induction, NFC enables two devices to send messages when they’re near one another. Today, NFC is part of all cell phones and most modern credit cards